blog-banner-image.jpg

Systems Engineering Blog

Four things to know before you get started with Azure

Five Compelling Reasons to Hop on the Fast-Moving SD-WAN Wagon

Technology end-of-life/support dates are no joke.

Holiday Greetings From Systems Engineering

Three Keys to Your Organization's 2019 IT Strategy

2018 Moments and Memories

SE Data Points Winter 2018: New Employees Bulletin

Getting the Knack of NAC – An Introduction to Network Access Control

IT's Cyber Monday, So Be Cyber Aware

Good Security Practices Create Great Business Relationships

An Introduction to SD-WAN - Part 1

Taking a moment to remember...

Cisco ASA Vulnerability

Why does SE "Mo?"

The 'Modern Desktop' from Microsoft

Best Practices to Create a Mobile Device Defense Strategy

Unified Communications: Empowering Businesses to Do More

Three Cost Effective Cybersecurity Tools Your Business Should Not Be Without in 2019

Planning for End-of-Life/Support Products

SE Spotlight:  Kelly Ridley

SE Data Points FALL 2018: New Employees Bulletin

Simple Mistakes Create the Biggest Cybersecurity Worries

An SE Engineer's Perspective of Microsoft's Ignite Conference

Webex Teams Services Unavailable - Now Restored

Systems Engineering Achieves Veeam Gold Pro Partner Status

National IT Professionals Day - Celebrating Our Team

Organizational Best Practices for Mobile Devices

The Cloud is Here to Stay: Backup and Recovery Redefined

WPA/WPA-2 Vulnerability Update

Systems Engineering Named One of Maine's Best Places to Work for the Fifth Consecutive Year

Five IT Best Practices for Organizations to Consider

How to Achieve the Latest School Technologies with E-Rate Funding

SE Lunch & Learn Recap:  Security & Compliance in the Cloud - The New Perimeter

SE Internship Program 2018

SE Spotlight: 2018 Summer Interns

CPU Hardware Vulnerability, Spectre/Meltdown

Practical Risk Assessments and Successful Outcomes

Ask Your Potential IT Provider These Six Questions

IT and Donuts: Say what?!

Creating a Culture of Security

What is Shadow IT and How do you Approach IT?

Integrating the Evolution of Technology Into Your Organization

VPNFilter Malware Threat

The Security Suitcase for Your Move to the Cloud

Microsoft Office 365 Spam Filter Vulnerability

Systems Engineering and the Travis Mills Foundation

In case of a disaster, retrieve backup.

SE Data Points SPRING 2018: New Employees Bulletin

SE Lunch & Learn Recap: Enabling A Modern Workforce

A Hacker's Low Hanging 'Security' Fruit

IT Project Management as Defined by a Project Manager

How to standardize, document, implement, maintain, and control Standard Operating Procedures

Systems Engineering Recognized for Excellence in Managed IT Services

Cisco ASA Firewall Web VPN Vulnerability

Bridging the Gap Between Generational Communication Preferences

Systems Engineering Welcomes Lynne Gawtry to its Senior Leadership Team

So you're moving. Now what?

Unusual Ransomware Strain Encrypting Cloud Email

The 411 On Cloud-based Phone Systems

Five Strategic IT Investments Every Company Should Be Making in 2018

One more reason to move to the cloud.

Happy New Year from Systems Engineering

SE 2017 Moments & Memories

SE Help Desk Team Knocked IT Out in 2017

SE Data Points WINTER 2017: New Employees Bulletin

2018 Office 365 Users' Group is Launched!

Email: To Trust, or Not to Trust?

Systems Engineering Receives Microsoft Gold Competency for Cloud Solutions

Systems Engineering Awards USM Computer Science Student with Scholarship

Notification: Maine Law Now Requires Direct Dialing of 9-1-1

A day in the life of an engineer with Cisco Spark

Systems Engineering Deepens Senior Leadership Team to Support Growth

Hardware Encryption Chip Vulnerability

WPA2 Vulnerability Update

Identify and Avoid Malicious Email

SE Data Points FALL 2017: New Employees Bulletin

The Evolution of Technology, Part 3

When is it time to conduct a Root Cause Analysis?

The Evolution of Technology, Part 2

The Evolution of Technology, Part 1

Systems Engineering Named One of Maine's Best Places to Work

2018 IT Budgeting: Top Priorities to Consider

3 Steps to Secure Information on Mobile Devices

Getting the Most Out of IT

iPhone Software Update 10.3.3

SE Lunch & Learn Recap:  Office 365 Adoption - Collaboration, Communications & Identity

IT Service Trends: What do businesses need today that they don't already have?

SE Summer Intern Program 2017

SE Spotlight:  Adrian Wells

Five Sales Lessons from a 14-year-old

SE Data Points SUMMER 2017: New Employees Bulletin

Foundations of Quality and Continuous Improvement

SE CleanMail Communication

Beware the "Goldeneye/Petya" Ransomware Attack

Blog Portfolio: Be Part of IT

Systems Engineering Expands Leadership Team and Adds Quality Role to Support Company's Strategic Vision and Growth Goals

If you call for IT, they will help.

The Secret Sauce in the Software Services Group

SE Alert: Breach at DocuSign

SE Alert: Global Ransomware Attack

Data breaches are only getting worse. So, what is your organization doing about IT?

Employee Ownership and Client Benefits

SE Alert: Google Doc Scam

Windows Vista Support Has Ended

SE Data Points SPRING 2017: New Employees Bulletin

Digital Transformation: Identify the Why

SE Alert:  New Zero-Day Attack Detected in Microsoft Word

Systems Engineering Expands into New Hampshire with Growth Plans in Mind

5 Tradeshow Tips to Help Drive ROI

Systems Engineering Named One of 2017 Tech Elite Solution Providers by CRN®

SE CleanMail has you covered.

Systems Engineering Announces SE PolicyAdvisor: New Service to Help Businesses Defend Against Cyberattacks

The Cloud is Here to Stay

SE Alert:  Microsoft Announces Delay in Security Updates

Microsoft Cloud Services: One Benefit You Won't Want to Miss

Culture and Mission: IT's What Makes the Team

Recruiting for IT 101

Windows 10: Enabling Your Move to the Cloud

Happy Holidays from Systems Engineering

2016 SE Moments and Memories

Technology Predictions for 2017

SE Data Points WINTER 2016: New Employees Bulletin

Systems Engineering Receives Governor's Award for Business Excellence

Let someone else do the troubleshooting.

Guest Blog: How to Read a SOC Examination Report

When You Leave IT, Lock IT

Employee Ownership and Work Ethic Go Hand-in-Hand

SE Guest Blog: Information Security Officer - It's not just a cool title

What's in your 'Managed Services?'

Linux Vulnerability Found After Nine Years

SE Guest Blog: Security Awareness Training - Purpose and Approaches

2017 IT Budgeting & Planning: Cloud, Applications and Cybersecurity

SE Blog Series: Digital Transformation

SE Spotlight: Andy Dixon

SE Data Points FALL 2016: New Employees Bulletin

Corporate WiFi vs. Guest WiFi Access

What goes into IT budgeting and planning, anyway?

Systems Engineering Named One of Microsoft's FY17 SMB Champions

It's okay if you don't know what the Clutter folder is...

Systems Engineering Named One of Maine's Best Places to Work in 2016

2017 IT Budgeting & Planning

6 Techniques to Become a Microsoft Outlook Ninja

Systems Engineering is Now Part of the Apple Consultants Network

6 Tips to Consider Before Making the Move to Microsoft Office 365 Exchange Online

Hiking to the Peak of IT

Symantec Vulnerability Identified

Microsoft Office 365 Email Delivery Degradation

SE Data Points SUMMER 2016: New Employees Bulletin

SE Spotlight: Nicole Ryan

SE Summer Intern Program 2016

Hyperconvergence Defined

Microsoft Office 365 Updates Sync Client for 250 Seats and Less

Ransomware Continues to Proliferate

Wrapping IT Up: Write and Maintain a Mobile Device Management Policy

Apple Ends Support for QuickTime for Windows - New Vulnerabilities Announced

Foggy on your Cloud Backup?

Infographic: Personal Devices & Corporate Data

Choosing IT as a Career, Part 3

Ensuring Your Backup and Restore Strategy is Reliable

What is Hyperconvergence?

SOC 2 Report: Why we do it.

SE Spotlight:  Jeff Trudel

SE Data Points SPRING 2016: New Employees Bulletin

MDM in the Workplace

Choosing IT as a Career, Part 2

Microsoft Office 2016 Upgrade Notifications

Office 365 Training Modules Now Available

Five Mistakes IT Teams Make to Compromise Network Security

Update on Windows 10 Upgrade

Choosing IT as a Career, Part 1

Cisco ASA IKE Vulnerability

Two Simple Steps to Begin Outlining an IT Systems Recovery Strategy

SE Lunch & Learn Infographic: Risk Management in the Era of Ransomware

Systems Engineering: a 2016 BOB Award Nominee

Good vs. Good Enough: How much data are you willing to risk?

HDI Analyst of the Year Award

Holiday Greetings From Systems Engineering

2015 SE Highlights and Happenings

Three Technology Influencers of 2015

SE Data Points WINTER 2015: New Employees Bulletin

Lessons Learned from Clicking

SaaS Talk

Business Email Compromise Scam

File Sharing Applications

Five Mistakes Employees Make to Compromise Network Security

A Day in the Life, Part 3: Customer Service

SE Lunch & Learn Recap:  Information Security Evolution and the Modern Network

SE Spotlight:  Bradford Sprague

Software Vendors Shifting Support Policies

SE Data Points FALL 2015: New Employees Bulletin

BYOD, MDM, and EMM Demystified

A Proper Introduction

SE Lunch & Learn: Information Security Evolution and the Modern Network

Emergency Patch Released: CVE-2015-2502

Wait a minute, this isn't Windows 10

Systems Engineering Named One of Maine’s Best Places to Work in 2015

A Day in the Life, Part 2: The IT Project Manager

Security Hole Found in Android Mobile Devices

The Good, the Bad, and the Ugly of Information Lifecycle Management

Microsoft Security Bulletin MS15-078

A Day in the Life, Part 1: The Help Desk Engineer

SE Data Points: New Employees Bulletin

SE Spotlight: Peter Koehling

Improving the Client Experience

Patch Management: A Critical Component of Network Security

SE Lunch & Learn Recap: Productivity & Collaboration in the Cloud

New Service: SE FileProtect

Critical Vulnerability Found in Adobe Flash Player 18.0.0.194

Phishing campaign exploits an Adobe Flash Player zero-day vulnerability

LastPass Breach and Recommended Steps

Cloud-based Capabilities and More

Another Cybercrime Network Disrupted

Defending the Corporate Network From Cybercrime

Systems Engineering Named to 2015 List of CRN Tech Elite 250

SE Data Points - Spring 2015

Phishing Tactics that Work

SE Lunch & Learn: Data Breach Reality Event Recap

Outsourcing Augments Internal IT Departments

SE Spotlight: John Zastrow

SE Data Points: New Employees Bulletin

SE Alert - Freak SSL Vulnerability

Avoiding the Lenovo Superfish Adware Risk

SE Data Points - Winter 2014

Systems Engineering's Look at 2014

SE Essentials Offers Comprehensive IT Management and Support

Practical Tips That Improve Network Security

SE New Employees Bulletin

Systems Engineering Launches New Managed IT Service

Systems Engineering Launches New Website

Congratulations to UMS on Their NSA & DHS Recognition

SE Alert: Critical Microsoft Vulnerability Identified

SE Alert: WinShock Zero-Day Vulnerability

CryptoWall Preventative Steps

SE Alert: Ransomware, aka Cryptolocker and now CryptoWall, and the evolving threat.

SE Alert: “POODLE” SSLv3 Vulnerability - Update

SE Alert: “POODLE” SSLv3 Vulnerability

SE Speaking at 2014 ANCOR Technology Summit & Showcase

Best Places to Work in Maine Awards Dinner

SE Alert: Bash Bug / Shell Shock Update

SE Alert: Bash Bug

Systems Engineering delivers centralized reporting capabilities to Apothecary by Design

Start planning now for Windows Server 2003 End of Support

Systems Engineering Named 2014 Best Places to Work in Maine

SE Lunch & Learn Recap: Cloud First, Mobile First - a Microsoft Road Map

SE Spotlight: Geralyn Savenelli

SE New Employees Bulletin

Virus Notice: Symantec releases definition file with a False Positive

Verizon Data Breach 2014 Report Findings

SE’s tier-free Help Desk model promotes successful customer relationships

E-mail Archiving: Long-Term Data Storage Management

What is your BYOD Strategy?

Simplifying Disaster Recovery

SE Spotlight: Thomas Doucette

SE Data Points New Employee Bulletin

Systems Engineering Events, June 2014

Microsoft Internet Explorer Vulnerability Patch Update

Systems Engineering Events, May 2014

Microsoft Internet Explorer zero-day vulnerability update

Microsoft IE Vulnerability Discovered

Systems Engineering Named to CRN’s 2014 List of Tech Elite 250

Heartbleed Bug - Continue Vigilance

Heartbleed Bug Security Update

Heartbleed Bug

System Engineering Events, April 2014

Systems Engineering’s Software Solutions Group Service Offerings

Windows XP: End of Life

Systems Engineering Achieves Advanced Collaboration Architecture Specialization From Cisco

Observations From the Cloud

Systems Engineering to Host Microsoft Office 365 Hands-on Lab Workshops

SE Spotlight: Jacob Haugh

SE Data Points New Employees Bulletin

Windows XP: All good things must come to an end.

Our 25th Anniversary Celebration and Open House was a great success!

Password Protocol

Systems Engineering's IT Checklist 2014

Systems Engineering Achieves SSAE-16 Type II Attestation Standard

Systems Engineering and Mercer Health Cyber Present Security and Health Care Reform

Information Management Workshop: "Managing and Protecting Business-Critical Information Assets"

U.S. LOSING THE BATTLE AGAINST CYBER CRIME

Systems Engineering Finds Niche with Managed Security Services

Systems Engineering Achieves SSAE-16 Type II Attestation Standard

Systems Engineering and Mercer Health Cyber Present Security and Health Care Reform

Information Management Workshop: "Managing and Protecting Business-Critical Information Assets"

Winning the Cybercrime Battle: A Proactive Approach to Network Security

Information Management Workshop Comes to Bangor

Systems Engineering CEO Appears on "Box Talk"

A Window into Windows Server 2012 and Windows Pro 8

Review: MicroSoft Windows 8 offers a consumer and IT friendly touch-enabled interface

Windows Server 2012 offers secure, scalable data storage with seamless virtualization capabilities

Systems Engineering Celebrates 25 Years

SE Spotlight: Jerry Desjardins

Risks of Unmanaged Data

SE Secure Protects Clients Nationwide

Managing Data Growth: The Dangers of Exponential Data Growth

Systems Engineering named to CRN's 2013 list of Tech Elite 250

Systems Engineering Named to CRN's 2012 List of Tech Elite 250

Systems Engineering Finds Niche with Managed Security Services

Jon Henderson Hired as a Business Development Manager at Systems Engineering for the Greater Bangor, ME area

Systems Engineering Achieves SSAE-16 Designation

Systems Engineering Announces New Cloud Computing Application

Systems Engineering Finds Niche with Managed Security Services